A Cyber Attack On Japan Could Bring The USA To War

US secretary of state Mike Pompeo recently declared that “a cyberattack could, in certain circumstances, constitute an armed attack under Article 5 of the US-Japan Security Treaty.” The security agreement, ratified after World War II, guarantees the United States’ defense in the event of an attack on Japan.

“This is significant from the perspective of deterrence,” said Japanese defense secretary Takeshi Iwaya, also present at the briefing.

In the first such meeting between Japanese and US defense officials since 2017, the two sides shared their concerns for stability in the region.

“Geopolitical competition and coercive attempts to undermine international rules, norms, and institutions, especially from China, present challenges to the alliance,” Pompeo said.

At a time when US lawmakers argue over what constitutes state-coordinated digital espionage, definitions are in order.

According to the Japanese Defence Ministry, a cyber-attack is an “abuse of information and communications networks” in the attempt to “access, steal, falsify or destroy information.” Defense against such attacks, there were almost 130b of them against Japan in 2016, has become a pressing issue for the Japanese government. With a majority of these attacks originating from China, it’s difficult to say how the US and Japan will now respond to them.

In a statement, from their defense officials, they said actions would be merited “on a case-by-case basis, and through close consultations.”

But difficulty in tracking responsible actors poses a challenge. In February, when the Australian parliament experienced an attack on its networks, there was speculation that the attempted breach originated from China. 

The attack “suggests a state actor because it’s hard to make money from breaching a parliamentary system,” said Fergus Hanson, head of the International Cyber Policy Center in Australia.

Until simple-to-understand evidence is possible in cyber-attacks, denying as slander will remain the status quo for world powers like China.

Meanwhile, defensive cooperation between allies like the US and Japan will continue behind the scenes.And it would appear that Japan can use all the help it can get. Late last year its minister of cybersecurity admitted not knowing how to use a computer and being confused as to what USB drives are.

Quartz

You Might Also Read:

NATO Could Go To War In Response To A Cyber Attack?:

 

 

« Hackers Delight: Poor Password Security
The CIA's Cloud Contract Is Worth Billions »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Certego

Certego

Certego is a company of the VEM Sistemi Group specialised in providing managed computer security services and to combat Cyber Crime.

IdenTrust

IdenTrust

IdenTrust enables organizations to effectively manage the risks associated with identity authentication.

National Security Authority (NBU) - Slovakia

National Security Authority (NBU) - Slovakia

The National Security Authority (NBU) is the central government body in Slovakia for the Protection of Classified Information, Cryptographic Services, Trust Services and Cyber Security.

CSIRT-IE

CSIRT-IE

CSIRT-IE is the body within the NCSC that provides assistance to constituents in responding to cyber security incidents at a national level for Ireland.

Randori

Randori

Randori is an attack platform that provides "red-teaming" as a service - basically, staging simulated hack attacks to test for vulnerabilities and gaps in the security response.

CUJO AI

CUJO AI

CUJO AI is the global leader in the development and application of artificial intelligence to improve the security, control and privacy of connected devices in homes and businesses.

Sentor Managed Security Services

Sentor Managed Security Services

Sentor Managed Security Services is a cybersecurity company that enables organizations to exist in a digitally connected world.

Cyber Lockout

Cyber Lockout

Comprehensive ransomware insurance and preventative cybersecurity technology solution, working together to help protect businesses 24/7/365.

Mailinblack

Mailinblack

Mailinblack protects your organisation against email threats with an innovative solution that meets your security requirements.

Slamm Technologies

Slamm Technologies

Slamm Technologies is a trusted IT firm that offers Cyber Security Support, Corporate IT Solutions and Professional IT Training courses with international certification.

EDGE Group

EDGE Group

EDGE is one of the world’s leading advanced technology groups, established to develop agile, bold and disruptive solutions for defence and beyond.

McAfee

McAfee

McAfee is a worldwide leader in online protection. We’re focused on protecting people, not devices. Our solutions adapt to our customers’ needs and empower them to confidently experience life online.

OpsHelm

OpsHelm

OpsHelm provides a Software-as-a-Service solution to help businesses ensure that all of their cloud environments have their security bases covered.

ATSG

ATSG

ATSG is a global leader in transformational technology solutions for today’s digital enterprise. Cybersecurity ranging from Advisory & Assessment to Fully Managed Detection and Response Services.

Infoline Tec Group Berhad

Infoline Tec Group Berhad

Infoline Tec Group Berhad is principally involved in providing IT infrastructure solutions, cybersecurity service provider and solutions, managed IT and other IT services.

Afripol

Afripol

AFRIPOL was set up to strengthen cooperation between the police agencies of AU member states in the prevention and fight against organized transnational crime, terrorism, and cybercrime.